Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Chongqing University of Posts and Telecommunications》 1999-04
Add to Favorite Get Latest Update

Internet Security —— Packet Filter and Firewall

ZHANG Dei ming (Department of Postgraduate Education,Chongqing University of Posts and Telecommunication,Chongqing 400065)  
This paper discusses two common security technologies:packet filter and firewall, and analyzes the working princtples of this two security technologies. It also presents the corresponding relations among paoket filter,firewall and network seven layer architechture. The paper brings forward some instructing rules of the building of firewall at last.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 4 Hits
1 Liu Zhongping Tong Hongxia;Design and Implementation of Firewall using Packet Filter Technique in Windows[J];Computer Study;2006-03
2 WANG Xiaowei1,LI Feng\+2(1College of Information Technology,Shenyang Normal University,Shenyang 110034,China;2Expressway Administration Bureau,Shengyang 110031,China);Study on correctness of firewall′s packet filtering rule[J];Journal of Shenyang Normal University(Natural Science);2003-03
3 WANG Xiao-wei~1,LI Feng~2(1.Shenyang Normal University,Shenyang 110034)(2.The High Way Administration Bureau of Laoning Province,Shenyang 110011,China);Accurate validate about the firewall's pack filtering rule[J];Journal of Shenyang College of Education;2003-03
4 GAO Lei1,SHI Shun-jin2(1.Network Education Center Tangshan College,Tangshan 063000,China;2.Tangshan Power Supply Company,Tangshan 063000,China);Research on Network Monitoring and Filtering[J];Journal of Tangshan College;2009-06
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Zen Chang-hua (Well testing company of xinjiang oilfield company Xinjing Klmy 834000);The Technique on Realization of Security on Data in the Local Internet[J];Information Security and Technology;2010-10
2 Cheng Wei (Beijing Polytechnic College,Beijing 100042,China);Research of Electric Power System Safety[J];Journal of Beijing Polytechnic College;2008-03
3 FU Xiao-xiao,WANG Shi-min(College of Computer Science and Technology,Beijing Technology and Business University,Beijing 100037,China);POKER GAME BASED ON RSA ENCRYPT ARITHMETIC[J];Journal of Beijing Technology and Business University(Natural Science Edition);2007-05
4 LU Si-jun,ZHU Hong,LI Xu-wei(College of Computers, SCU, Chengdu 610064, China);Application of deep packet inspection technology to firewall[J];Journal of Chengdu University of Information Technology;2005-01
5 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
6 YE Ji?xiang1, HU Xiao?bing2 (1.Dept. of Computer Eng., Changsha Communication Univ., Changsha 410076, China;2.Dept. of Education,Changsha Univ.of Electr. Power, Changsha 410077,China);Design of Enterprise Network Based on Secure Strategy[J];Journal of Changsha University of Electric Power(Natural Science);2001-01
7 LIU Xiang-hua (Dept. of Math. & Computer,Changsha Univ. of Electr. Power,Changsha 410077,China);Encrypt Arithmetic of Symmetry[J];Journal of Changsha University of Electric Power(Natural Science);2002-04
8 LIU Xiao hong (The 613th Research Institute of AVIC, Luoyang 471009);Virus Defense Technology for Avionics[J];Electronics Optics & Control;2001-03
9 Chen Wei1,Wang Qiong 2(1.Central South University;2.Hunan school of communications);THE INFORMATION SECURITY ON THE INTERNET AND FIREWALL[J];Journal of Dongguan Institute of Technology;2002-01
10 GAO Shu feng (Dept. of Econ. and Trad., Dalian Inst. of Light Ind., Dalian 116034, China);The Application of Firewall in Intranet[J];JOURNAL OF DALIAN INSTITUTE OF LIGHT INOUSTRY;1999-03
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Hu Xiangdong (Postal Automation Institute,Chongqing University of Posts and Telecommunications, Chongqing 400065);Discussion of Elctmail's Security[J];Journal of Chongqing University of Posts and Telecommunications;1998-04
2 Zhou Shijie Qin Zhiguang Geng Ji (College of Computer Science and Engineering, UEST of China Chengdu 610054);Security in Office Automation[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;2000-02
3 $$$$;Analysis of Security SSL[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1998-04
4 Wu Gang et al;Implementation of CORBA-based Network Security Management[J];COMPUTER DEVELOPMENT & APPLICATIONS;1999-02
5 ;基于IP包内容的Windows包过滤技术的实现[J];Computer and Information Technology;2001-03
6 ;Role-Based Access Control System[J];ELECLIONCI ENGINEER;2000-02
7 WANG Cheng liang 1, HE Yu lin 2 (1. College of Computer Science,Chongqing University,Chongqing 400044,China; 2. College of Mechanical Engineering,Chongqing University,Chongqing 400044,China);Universal Chart Generation Method on Web Pages[J];JOURNAL OF CHONGQING UNIVERSITY(NATURAL SCIENCE EDITION);2000-04
8 WANG Cheng-liang 1, HE Yu-lin 2 (1. College of Computer Science and Engineering,Chongqing University,Chongqing 400044,China; 2. College of Mechanical Engineering,Chongqing University,Chongqing 400044,China);Fast Constructing Method of Web DataBase Query System Under CIMS Integrated Environment[J];Journal of Chongqing University(Natural Science Edition);2001-02
9 WANG Cheng-liang 1, HE Yu-lin 2 (1. College of Computer Science and Engineering,Chongqing University,Chongqing 400044,China; 2, College of Mechanical Engineering,Chongqing University,Chongqing 400044,China);Development of House Architectural Area Computing and Plotting System[J];Journal of Chongqing University(Natural Science Edition);2001-03
10 WANG Cheng liang (College of Computer Science and Engineering, Chongqing University, Chongqing 400044,China);Database Queries of Drawing's Associated Information and Its Application[J];Journal of Chongqing University(Natural Science Edition);2002-01
【Secondary References】
Chinese Journal Full-text Database 5 Hits
1 Wang Zhe He Side(School of Information Science and Engineering,Yunnan University,Kunming 650091);An Algorithm of Firewall Rule Conflict Detecting[J];Computer & Digital Engineering;2010-05
2 SHENG Zhong-qi1,2,XU Hong-xue2,ZHU Yun-long1,LIU Yongxian2 (1.Shenyang Institute of Automation,Chinese Academy of Science,Shenyang 110016,China;2.School of Mechanical Engineering and Automation,Northeastern University,Shenyang 110004,China);Research on security structure of collaborative design system[J];Journal of Shenyang University of Technology;2007-02
3 ZHAO Zhi-gang,WANG Zhan-jun(Department of Computer and Math,Shenyang Normal University,Shenyang 110034,China);Practice of Packet Filter Firewall in File Based Testing System[J];Journal of Shenyang Normal University(Natural Science Edition);2007-03
4 ZHAO Ke-xin,CHEN Yu-fang(Hebei Engineering and Technical College,Cangzhou 061001,China);Design and Research on Packet Filter Firewall System[J];Modern Electronics Technique;2011-06
5 LI Xiao-qian(Guizhou Province Public Security Bureau Narcotics Corps,Guiyang 550002);Exploration on the Firewall System Security Technology[J];Modern Computer;2010-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved